Skip to content
Cybersecurity in the Emerging Digital World

Cybersecurity in the Emerging Digital World

It seems like a long time ago now that various malware attacks have changed the security landscape at the operational level and have exposed vulnerabilities in the automation architecture. However, as we move towards Smart Manufacturing to improve efficiency, to improve productivity and delivery reliability using the principles of Industry 4.0 and the Industrial Internet of Things (IIoT), the topic of cybersecurity is arguably even more important.

Smart Manufacturing depends on the merging of the IT and OT layers of a company and when applied to an existing factory, it would be reasonable to assume that the potential for cyber attacks, if nothing is done about this, will be significant.

If we were to design a new factory, it would be relatively be easy to build these while taking into account all current cyber security issues and vulnerabilities. The reality is that most factories have been around for a long time and most of them automation considerations are focused on productivity and not on cyber security. In this existing industrial landscape, it was realized that operating systems were potentially vulnerable, often as a result of outdated or poorly maintained operating systems and CD drives or USB ports that were not locked.

Cybersecurity is an arms race of escalating capabilities, so 'defenders' of vulnerable assets should view it as a journey rather than a destination, requiring them to constantly reassess the situation assess and implement new defenses when necessary. This all in a trend of ever-expanding systems, which must be open and control increasingly complex systems.

To be successful, the defense strategy must be against cyber attacks are viewed as a whole and at all levels of the enterprise take place. This must start at the factory level and manufacturers of automation equipment should consider whether they want to build in security as a natural part of the design process.

PLCs (programmable logic controllers) must for example, contain multiple built-in features, such as hardware security keys and multi-layer password structures.

The use of hardware verification of the security key prevents programs from being opened or edited on unapproved PCs that are not "bound" to the security key. PLC CPUs can also be linked to the security key and programs cannot run unless this hardware agreement is exists. This also has the advantage that the intellectual property of the control system is protected. In addition, IP filtering should be used to to record the IP addresses of devices approved for access to any PLC or HMI (Human Machine Interface). This allows unauthorized access much more difficult.

While end users want maximum security; they will also continue to insist on simple operation. Some of these automation security measures, all of which are optional, would can make it more complicated and therefore the entire security must be considered, taking into account all aspects of the operation. It may be that in some areas, some measures can be relaxed for the benefit of the continuation of business operations and that is fine as long as the risk is estimated and countermeasures are taken elsewhere to contain the threat reduce. As with everything related to cybersecurity, the considerations are “how likely is it” and “what is the risk”! Security and operational systems must be designed around these key criteria designed.

There will always be people who for whatever reason also seek unauthorized access to control systems. Therefore, manufacturers and control engineers incorporate safety measures into their products and build systems in and recognize that these are overcome obstacles rather than of insurmountable obstacles, and therefore must be constantly renewed and redeveloped.

We know from experience that the control software is the latest link is in the construction of a machine or process and that there are always enormous interests play a role in making the machine produce as quickly as possible. Furthermore cybersecurity is like buying a safe or making a backup. You don't know until what a mess it can cause when it's too late!

Make sure you stay one step ahead and think about your security, There are already many options built into the PLC/HMI!

Cart 0

Your cart is currently empty.

Start Shopping